18 minutes
🇬🇧 English
Speaker 1
00:00
We'll be right back. -♪ ♪ -♪ ♪
Speaker 2
00:04
Encryption. The best way to keep people from reading your email short of making the subject line, forward, forward, forward, forward, hilarious joke from Uncle Walter. No one's reading that. You may not think about encryption much, but it is pretty fundamental to all our lives.
Speaker 3
00:19
Almost everything you do today uses a code. Every time you log on to an internet service like Twitter or Facebook and send your password, every time you log in to internet banking, all of that information is protected using encryption code.
Speaker 2
00:33
That's right. -♪ ♪ -♪ Encryption can protect the things most important to us. Our financial information, health records, dick pics, trade secrets, classified government records, dick pics, our physical location, the physical location of our dicks, credit card information, dick pics, and pictures of our dicks.
Speaker 2
00:51
And it's not just our data. Lots of things have computers in them now, even cars. And last year, 2 hackers showed a writer from Wired how they could disable his car on the interstate.
Speaker 1
01:03
Do it. Kill the engine.
Speaker 4
01:05
So we're killing the engine right now.
Speaker 1
01:06
-♪ Do it, do it, do it, do it, do it, do it, do it, do it, do it. -♪ Actually, he's paying for the accelerators.
Speaker 5
01:10
I turned on my hazard lights, but I was still stuck in the right lane with no shoulder to escape onto.
Speaker 1
01:16
Guys, I'm stuck on the highway. What'd he say?
Speaker 6
01:19
I don't know,
Speaker 1
01:19
I think he's panicking.
Speaker 2
01:21
Yeah. No shit he's panicking. You killed his engine on the freeway. Those hackers seem like they've played so many video games, they've forgotten that cars are actual objects carrying living people.
Speaker 2
01:34
But while it can keep us safe, it's important to note, encryption also has a downside. It's become so ubiquitous, it's making it impossible for law enforcement to gain access to certain information. Or, as FBI Director James Comey puts it...
Speaker 7
01:46
Technology has become a tool of choice for some very dangerous people. And unfortunately, the law has not kept pace with technology, and this disconnect has created the significant public safety problem we have long described as going dark.
Speaker 2
02:01
Yes, going dark. It's a deliberately ominous-sounding term, because you wouldn't get so scared if they just called it, Bad Guy Go Bye-Bye. And you may have heard about this going dark problem recently related to 1 particular work iPhone belonging to Saeed Farooq, the San Bernardino gunman who, with his wife, killed 14 people last December.
Speaker 8
02:20
The FBI needs Apple's help because the security settings on the phone lock the device if a password is entered incorrectly too many times. It may even erase all the data on the phone. The FBI wants Apple to upload software that lets its analysts get around the security features and take as many shots at the passcode as necessary.
Speaker 2
02:39
Yes, the FBI has a dead terrorist cell phone that they cannot get into. It's running a newer version of Apple's operating system where the data is fully encrypted and can only be accessed by unlocking the passcode. Even Apple can't currently get into the phone.
Speaker 2
02:53
So the government is essentially demanding that they come up with a cheat code for their top-selling iPhone game, -"Fuck What's My Passcode?" rated E
Speaker 1
03:01
for everyone.
Speaker 2
03:01
-$E for everyone. -$E for everyone. -$E for everyone.
Speaker 2
03:02
Apple is currently fighting that order in court, arguing it shouldn't be forced to undermine the security features that protect its encryption, an argument which some have found troubling.
Speaker 4
03:11
I think Apple leadership risks having blood on their hands.
Speaker 5
03:14
How in the hell you can't access a phone? I just find baffling. Any system that would allow a terrorist to communicate with somebody in our country and we can't find out what they're saying is stupid.
Speaker 5
03:28
Oof.
Speaker 2
03:30
That is the angriest Lindsey Graham has been about a cell phone since his name got auto-corrected to Linty Grandma. Stupid phone! Learn my name, I am your boss!
Speaker 1
03:39
-♪ I am your boss! -♪ LAUGHTER AND
Speaker 2
03:40
APPLAUSE Stupid! So dumb! -♪ I
Speaker 1
03:43
am your boss! -♪
Speaker 2
03:44
LAUGHTER AND APPLAUSE This... This issue has even been brought up on the campaign trail with predictable results.
Speaker 1
03:50
What I think you ought to do is boycott Apple until such time as they give that security number. How do you like that? I just thought of...
Speaker 1
03:57
Boycott Apple.
Speaker 2
03:59
Oh, anyway, I just thought of it. I just thought, give me another 1. Israel-Palestine, make them wrestle in those fake sumo costumes.
Speaker 2
04:04
Done, done. Being president is easy.
Speaker 1
04:07
-...
Speaker 2
04:08
But I will say, this is a rare case where Donald Trump's outrage is almost understandable, because Apple's refusal to help crack a terrorist's phone can seem hard to defend, especially when, like John Miller of the NYPD, you think about it incredibly simplistically.
Speaker 9
04:25
There's no bank, there's no safe company, there's no vault, there is no apartment, there is no door that can't be penetrated with a lawful order from a U.S. Court.
Speaker 2
04:34
Okay, point taken, but was penetrated the best word choice there? The government needs to be able to penetrate you at any time. If we feel you need penetration, we have to be able to penetrate you quickly and effectively here and now.
Speaker 2
04:48
Why is everyone getting so uptight about this? --AUDIENCE LAUGHS-- But this is not simple. It's a hugely complicated story with massive implications. And once we get to the end of it, you may not feel the same way that you do now.
Speaker 2
05:02
Because to that man's point, an encrypted phone is not really like a bank or a safe. If you penetrate a safe, you've only penetrated that safe. But a code to open a phone could be modified to open many, many more phones. A fact that does not escape Apple CEO Tim Cook.
Speaker 6
05:18
No 1, I don't believe, would want a master key built that would turn hundreds of millions of locks. Even if that key were in the possession of the person that you trust the most, that key could be stolen. The only way we know to get additional information is to write a piece of software that is the software equivalent of cancer.
Speaker 2
05:42
Okay, now, on 1 hand, giving your phone cancer sounds bad, but on the other hand, the fault in our stars would have been amazing if Shailene Woodley was playing a terminally ill iPhone 6S. No, God damn it, I won't let you go, Hazel! I'll hold down the power button and the home button simultaneously forever.
Speaker 1
06:00
-♪ ♪ -♪
Speaker 2
06:02
And to be clear, Apple hasn't been completely uncooperative. They've already given the FBI the information they could access, including Farouk's iCloud backups from about 6 weeks before the attacks. But they are refusing to create the cancerous program the FBI wants.
Speaker 2
06:17
Not because it can't be done. They say it would take 6 to 10 engineers up to 4 weeks to do it. Or, you know, a standard genius bar appointment. But...
Speaker 2
06:26
But Apple worries that once they make that program, they can't keep it 100% safe. And the FBI and its supporters can be weirdly dismissive of that issue in ways that indicate they either don't fully understand how technology works or are pretending not to.
Speaker 9
06:41
What the government is asking Tim Cook is, you designed it, you can design your way out of it for this 1 time. If you figure out the formula and crack open this phone to the point that we can then try codes against it, you can tear that formula up, toss it in a fireplace and throw it away.
Speaker 2
06:57
Oh, come on. You know Apple is not writing its code on paper next to a fireplace. They're a cutting-edge technology company, not Lord Grantham.
Speaker 2
07:07
And as for the notion Apple can throw the formula away after the FBI uses it once, nobody seriously thinks that is going to happen.
Speaker 10
07:16
Apple says if it complies, requests from law enforcement could come for another phone an hour later, opening a Pandora's box. Apple officials pointed to the Manhattan District Attorney who says he has 175 iPhones with potential evidence from serious crimes, including murder, that he cannot open.
Speaker 2
07:33
Exactly. There are over 175 other phones in line just in New York, so this is bound to set a precedent. Think of the government as your dad. If he asks you to help him with his iPhone, be careful!
Speaker 2
07:46
Because if you do it once, you're gonna be doing it 14 times a day. And whatever happens in this case will have ramifications, because the FBI ultimately wants Apple and the entire tech industry to have its encryption always be weak enough that the company can access customers' data if law enforcement needs it. So it might be the iPhone today, an Android phone tomorrow, and a BlackBerry the day after that. Assuming that the day after that is in 1998.
Speaker 2
08:15
And you might be wondering, but look, if there's a warrant, do these companies really have a choice? To which the answer, surprisingly, might be, yes, they do. The government is currently citing the All Writs Act of 1789, which essentially mandates you must cooperate with investigators if they ask you to do something. But courts are split over whether it applies in cases like these.
Speaker 2
08:36
And there's not really any more recent law covering this area, which is not entirely an accident, because we have been down this road before. The government grappled with encryption 2 decades ago. And in the early 90s, they even came up with what they thought would be the ideal solution.
Speaker 6
08:53
The government will press private companies to use a so-called clipper chip in their computers, which would allow authorities to monitor coded messages.
Speaker 2
09:02
Now, that clipper chip was theoretically perfect. Your information could be encrypted, but the government would have an access point when it needed it. It was like giving your house key to a trusted neighbor.
Speaker 2
09:12
You can trust Mike. He's only gonna try on your underwear if it's absolutely necessary. --LAUGHTER --There was just 1 problem with that chip. A computer scientist and hacker named Matt Blaze figured out a way to disable the government access feature of the chip, and the whole project was eventually abandoned.
Speaker 2
09:30
And by the way, is there a more 90s series of words than a hacker named Matt Blaze? It's gotta be right up there with talk to the hand, Furby. And Grammy Award winners, Milli Vanilli. But Thanks to the Clipper Chip fiasco and strong pressure from tech companies, the government backed off, eventually abandoning the push for a perfect backdoor.
Speaker 2
09:53
But decades later, they seem to have convinced themselves that it can be done.
Speaker 9
09:58
I believe that Apple's capabilities are remarkable when it is their desire.
Speaker 7
10:02
I think Silicon Valley is full of great people who when they were younger were told, your dreams are too hard. They were standing in a garage someplace. They were told, can't be done.
Speaker 7
10:10
Thank goodness they didn't listen.
Speaker 4
10:11
I hate to hear talk like, that cannot be done. I mean, think about if Jack Kennedy said, we can't go to the moon, that cannot be done. He said something else, we're gonna get there in the next decade.
Speaker 2
10:22
Okay, listen, I love that optimism, but for the record, there are lots of things we can't do even though we've been to the moon. For example, we are yet to master time travel or figure out why Hulk Hogan dresses for court like he's a pallbearer at a boa constrictor's funeral. Those still elude human understanding.
Speaker 2
10:42
And to some extent, the government's faith in Apple's magic powers is the company's own fault. After all, their ads have linked them to Einstein and Gandhi, and they sell the most mundane aspects of their products as world changers.
Speaker 8
10:56
This is iPhone 6S. Not much has changed, except... It responds to the pressure of your finger.
Speaker 8
11:02
Now you can change apps like this, pay at more places like this, and the new color looks like this. It's rose gold, it's awesome.
Speaker 2
11:09
Ugh. No, it is not.
Speaker 1
11:12
-♪ ♪ -♪
Speaker 2
11:13
Rose gold looks like someone vomited a salmon dinner onto a pair of dirty ballet shoes.
Speaker 1
11:18
-♪ ♪ -♪
Speaker 2
11:20
But ads like those obscure the real truth about Apple, which is that beneath their shiny, rose gold surface, they, like any other software company, are incredibly susceptible to hackers who are constantly finding flaws in their security features. Right now, you can buy boxes like this 1 on eBay that can hack you into an iPhone running some versions of iOS 8 or lower. Just watch this YouTube video showing you how they work.
Speaker 2
11:45
You just attach the wire to the screen, adjust a few settings, let it cycle through passcodes, and eventually, you are in. And Apple, understandably, do not want us thinking too much about that. Scary security flaws is 1 of those three-word phrases they absolutely hate to be associated with. Like corporate tax avoidance, or factory suicide nets.
Speaker 2
12:07
Also, when Apple argues that if it's forced to have access to all its customers' encrypted data, it can't 100% guarantee its safety, most computer scientists agree. Or, as Matt Blaze, the guy who hacked the Clipper chip, puts it...
Speaker 11
12:22
When I hear the, it's, if we can put a man on the moon, we can do this, I'm hearing an analogy almost as if we're saying, if we can put a man on the moon, well, surely we can put a man on the sun.
Speaker 2
12:32
And that... That is a rational, scientific view. Just because a man can walk on the moon does not mean he might as well be walking on the sun.
Speaker 2
12:41
A point summarized recently in the New England Journal of Smash mouth. But... But look... But look, for the sake of argument, let's assume Apple could have access to your encrypted data, repeatedly help law enforcement and always keep the bad guys out, which again, is widely thought by experts to be impossible.
Speaker 2
13:01
That still won't solve the FBI's going dark problem. Because if you really want to keep your communications secret, there's an app for that.
Speaker 8
13:09
The encryption debate is proving to be a good business for 1 startup, Telegram, a messaging app that encrypts messages end-to-end has surpassed 100 million users.
Speaker 2
13:18
And that's the point. People who want encryption will always be able to find it. If it's not Telegram or WhatsApp, it could be 1 of the more than 800 other encryption products out there, almost two-thirds of which are made by companies not easily covered by U.S.
Speaker 2
13:32
Law. Like Silent Phone, or Threema, or Snickety Snack, or Mail Grub. Now, granted, those last 2 aren't real, but the point is, they will be in 5 minutes if the government forces the other ones to weaken their encryption. And that might not be the only unintended consequence of the FBI's actions.
Speaker 2
13:52
Many countries around the world, including Russia and China, are watching this debate, and will presumably expect similar access, because, as you know, Russia and China have as much respect for privacy as horny teenagers in 80s comedies.
Speaker 1
14:06
-♪ ♪ -♪
Speaker 2
14:07
And when you consider all this, the legal tenuousness of the FBI's case, the security risks of creating a key, the borderline impossibility of perfectly securing the key, the international fallout of creating a president, and the fact that a terrorist could circumvent all of this by downloading whatever the fuck Threema is, it's enough to sway the most strident opinion. Case in point, remember Lindsey Graham? Mr.
Speaker 2
14:32
This is stupid? Just this week, 3 months after he said that, he was in a hearing with the Attorney General, Loretta Lynch, about this subject, and this happened.
Speaker 8
14:43
I think that for us, the issue is about a criminal investigation into a terrorist act and the need to obtain evidence.
Speaker 5
14:50
But it's just not so simple. And I'll end with this. I thought it was that simple.
Speaker 5
14:53
I was all with you until I actually started getting briefed by people in the intel community. And I will say I'm a person who's been moved by the arguments of the precedent we set and the damage we may be doing to our own national security.
Speaker 2
15:07
It's a miracle Lindsey Graham has met the concept of nuance. And this is a man who once warned, the world is literally about to blow up. So, you're not dealing with someone who likes to dabble with gray areas.
Speaker 2
15:21
And look, there is no easy side to be on in this debate. Strong encryption has its costs, from protecting terrorists to drug dealers to child pornographers. But I happen to feel that the risks of weakening encryption, even a little bit, even just for the government, are potentially much worse. And even though I'm on Apple's side in this case, I do think they would help both their customers and the government understand this a lot better if they were a little more honest regarding security in their ads.
Speaker 12
15:50
Hi, we're Apple. This is an Apple iPhone. It comes in rose gold.
Speaker 12
15:54
It's awesome. This is an Apple customer.
Speaker 13
15:56
Hey, Siri, find vegan sushi.
Speaker 12
16:00
Sounds good. And these are the engineers who make our products.
Speaker 13
16:03
Hey.
Speaker 12
16:03
Hey, guys. We can help you communicate, celebrate, pay for stuff, everything. But here's something you should know.
Speaker 12
16:10
We're barely 1 step ahead of hackers at all times. So that when you idiots lose your phone, Your information doesn't wind up in the hands of guys like Gary.
Speaker 13
16:17
Hey, I'm Gary. Thanks for losing your phone, dipshit.
Speaker 12
16:21
Hey, Gary. Because if Gary can get in, he has access to pictures of your food, your bank account, pretty much everything.
Speaker 13
16:27
Now I can masturbate to photos of your family.
Speaker 12
16:30
Okay, Gary. And when we find out there's a security flaw, this is how we react. F***.
Speaker 12
16:35
F***. F***. Yeah, that's about right. So when the FBI comes to us and asks if we can undermine our encryption without compromising everyone else's e-mails, texts, and skateboarding videos, This is our response.
Speaker 13
16:45
Are you f***ing kidding me? We're engineers, not wizards.
Speaker 12
16:48
You sure you're not wizards?
Speaker 13
16:50
Yeah, pretty sure.
Speaker 12
16:52
F***. Okay. Listen, Apple's not perfect. You need proof?
Speaker 12
16:56
We made the Newton. We made that 1 Mac that looks like a toaster. We actually thought the Apple Watch was cool.
Speaker 13
17:02
Wait, this isn't cool?
Speaker 12
17:03
Oh, f**k no. Shit! We put a YouTube album on your phones.
Speaker 12
17:07
You know, the 1 you've been struggling to delete? That thing keeps coming back, huh? And you can't even make our battery last more than, like, a day. Why is that exactly?
Speaker 13
17:16
Have you tried turning off location services and push emails and adjusting your screen brightness so that you can...
Speaker 12
17:21
Okay, forget we asked. The point is, best case scenario, we can keep hackers out of your stuff for about 6 months before this happens again.
Speaker 13
17:28
I'm back. I see someone's been to the beach.
Speaker 12
17:38
So please, keep enjoying our products. Just know this shaky edifice could crumble at any moment. Apple, join us as we dance madly in the lip of the volcano.
Speaker 1
17:48
We will! We will! We will!
Omnivision Solutions Ltd